O'Reilly logo
  • Michael Weiss thinks this is interesting:

First the adversary takes some action, to steal, destroy, or tease. This causes the defender community to circle-up develop protections, build firewalls, and perimeter sensors, develop access controls and policies for behavior. This in turn encourages the adversaries to develop new technologies and new means of achieving their objectives.


Cover of Research Methods for Cyber Security


Arms race